/ Most Commented

More Targeted Phishing, Spam and Mobile Attacks; IBM Reports 150K Security Events Per Second

IBM today released the results from its annual X-Force 2010 Trend and Risk Report, identifying more targeted phishing, spam and mobile attacks. The report also finds cloud security continuing to evolve. "From Stuxnet to Zeus Botnets to mobile exploits, a widening variety of attack methodologies is popping up each day," says Tom Cross, threat intelligence manager, IBM X-Force. "The numerous, high profile targeted attacks in 2010 shed light on a crop of highly sophisticated cyber criminals, who may be well-funded and operating with knowledge of security vulnerabilities that no one else has. Staying ahead of these growing threats and designing software and services that are secure from the start has never been more critical." more

IFTF Tribute to Paul Baran: Forecasted Online Shopping, News and Banking in 1971

With the recent passing of Paul Baran, IFTF is releasing an excerpt of a 1971 report in tribute, entitled "Brief descriptions of potential home information services." The excerpts are from the report titled, Toward a Study of Future Urban High-Capacity Telecommunications Systems, which included a handbook of forecasts for what was then called "broadband telecommunication and information services," later known as the Internet. more

New Anti-phishing Initiative Introduced by Yahoo!

Neil Schwartzman writes to report: "The company announced the Yahoo! Mail Anti-Phishing Platform (YMAP) yesterday. The technology is predicated upon the use of both DKIM and Sender Policy Framework (SPF) to identify authentic messages. As part of the initiative, Yahoo! has partnered with email authenticators Authentication Metrics, eCert, Return Path, and Truedomain to provide broad-band coverage of well-known brands." more

Google Starts Experimental Fiber Network Rollout With Kansas City

Google today announced plans to build ultra high-speed broadband service to a selected community in the U.S. as part of its experimental fiber network. In its announcement via a blog post, the company says: "In selecting a city, our goal was to find a location where we could build efficiently, make an impact on the community and develop relationships with local government and community organizations. We've found this in Kansas City. We'll be working closely with local organizations including the Kauffman Foundation, KCNext and the University of Kansas Medical Center to help develop the gigabit applications of the future."
 more

Stumbling Forward Means Promoting IDNs

A couple of weeks ago during the 40th ICANN meeting in San Francisco I got up to talk at the microphone. I spoke about the needs of developing markets on the web, about the importance of focusing on the 56% of the world that doesn't use Latin character scripts and about the struggles they still face as they go about their everyday lives - chatting, shopping or when pushed, promoting regime change - all using the internet... more

FedRAMP: Critical to Cost-Effective Cloud Computing Cybersecurity

In September 2009, the Obama Administration announced the Federal Cloud Computing Initiative. As the government's CIO explained, cloud computing "has the potential to greatly reduce waste, increase data center efficiency and utilization rates, and lower operating costs." The Federal Risk and Authorization Management Program (FedRAMP) addresses the key elements of a cloud computing framework for federal agencies. more

Who Has Taken Over As the Most Prolific Botnet Since Rustock Was Taken Down?

Over at the site V3.co.uk, they have an article up today alleging that since the Rustock takedown two weeks ago, the bagle botnet has moved to take over as the botnet that is responsible for sending the most spam. They have not replaced Rustock's total spam volume, only that they are now the number one spam sending botnet. more

Cloud Services Drive Data Center Markets

Research from Infonetics shows that last year was a strong year for data centre network equipment sales, due to a rebound from bare-bones 2009 spending levels and, more importantly, fundamental trends favouring investments in the data centre, such as the explosion of content and traffic, use of virtualization, and increasingly, cloud-based services and architectures. more

Amount of Unsolicited Internet Traffic Reflecting Situation in Libya

During the recent political unrest in the Middle East, researchers have observed significant changes in Internet traffic and connectivity. Typically people look at routing data, latencies when connecting to sites and search and query statistics. Here we show results from a previously unused source of data: unsolicited Internet traffic arriving from Libya. The traffic data we captured shows distinct changes in unsolicited traffic patterns since 17 February 2011. more

.XXX Exposes the Naked Truth for ICANN

Internet governance can be a little on the dry side. So when tech policy reporters get a chance to write an ICANN story that features porn stars on picket lines, it's hard to blame them when they run with it. But all the media hype about ICANN's .xxx decision at last week's meeting in San Francisco exposed the real dilemma facing ICANN: how to engage governments in a multi-stakeholder model that's led by the private sector. more

Death of the PKI Dragons?

The recent attack on the Comodo Certification Authority has not only shown how vulnerable the current public key infrastructure is, but also that the protocols (e.g., OSCP) used to mitigate these vulnerabilities once exploited, are not in use, not implemented correctly or not even implemented at all. Is this the beginning of the death of the PKI dragons and what alternatives do we have? more

Old Cloud vs. New Cloud

Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more

Microsoft Offers $7.5 Million to Buy 666,624 IPv4 Addresses

Jaikumar Vijayan reporting in InfoWorld: "Microsoft has agreed to pay $7.5 million to purchase a block of 666,624 IPv4 addresses from bankrupt Canadian telecom equipment maker Nortel in a move that some see as a signal of the increasing value of IPv4 addresses. Last week, Nortel filed a motion seeking approval for the sale from the Bankruptcy Court for the District of Delaware. If the deal is approved, Microsoft would assume control of the IPv4 addresses, currently owned by Nortel, for about $11.25 a piece." more

ICANN and the GAC - Lessons Learned Since Cartagena

Experience is the best teacher. In the interest of capturing lessons learned (and avoiding the repetition of hard experiences needlessly), it is worth highlighting what the interactions between the ICANN Board and the Governmental Advisory Committee (GAC) since Cartagena have taught. more

Digging Through the Problem of IPv6 and Email - Part 2

We have seen that spammers already possess the ability to hop around IP addresses quickly. They do this because once an IP gets blocked, it is no longer useful to them. There are only so many places they can hide, though - 4.2 billion places they can hide. However, in IPv6, if they are able to do the same pattern of sending out mail and hopping around IP addresses the same way they do in IPv4, then there is virtually unlimited space they can hide in. more